The Honeynet Project - Kelihoshttp://honeynet.org/taxonomy/term/227/0
enFAQ on Kelihos.B/Hlux.B sinkholinghttp://honeynet.org/node/836
<p>On March 31, 2012, the Honeynet Project published a draft <a href="https://honeynet.org/codeofconduct">Code of Conduct</a> and a statement about <a href="https://honeynet.org/node/834">Ethics in Computer Security Research: Kelihos.B/Hlux.B botnet takedown</a>.</p>
<p>The initial draft of the Code of Conduct was drawn from concepts described in the <a href="http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560.pdf">The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research</a> that was published in the United States <a href="http://www.federalregister.gov/articles/2011/12/28/2011-33231/submission-for-review-and-comment-the-menlo-report-ethical-principles-guiding-information-and">Federal Register on December 28, 2011</a> for public comment. The Code of Conduct was refined through discussion within the Legal and Ethics Committee and volunteer Honeynet Project members to help make it workable within the structure of the Honeynet Project membership for evaluating the ethics of future research activities.</p>
<p>The following FAQ reflects how the <a href="http://www.computer.org/csdl/mags/sp/2012/02/msp2012020071-abs.html">Menlo Report</a> principles and proposed Honeynet Project Code of Conduct can be used to analyze and explain an action like the Kelihos/Hlux sinkholing operation.</p>
<p><a href="http://honeynet.org/node/836" target="_blank">read more</a></p>code of conductethicsKelihosKelihos.B/Hlux.BSun, 01 Apr 2012 23:26:57 +0000david.dittrich836 at http://honeynet.orgEthics in Computer Security Research: Kelihos.B/Hlux.B botnet takedownhttp://honeynet.org/node/834
<p>Earlier, we posted about <a href="http://honeynet.org/node/833">our operation on the Kelihos.B/Hlux.B botnet takedown</a> that was conducted with by security experts from Dell SecureWorks, CrowdStrike, Kaspersky, and the Honeynet Project. On initial view, the operation seems very clear cut: the bad guys are running a botnet that is doing havoc on the Internet; on the other side, are the good guys that have found a way to disable the botnet.</p>
<p>The situation is much more nuanced. The Honeynet Project has been conducting security research for over a decade now and since our early days, we made it a priority to balance benefit and risks in our research. You can trace this back to when the Honeynet Project first defined "data control" as one of the requirements for honeynet/honeypot deployments. The purpose of data control was to minimize potential harm to others resulting from honeypots, which by their nature are vulnerable systems we expect to be compromised and used by malicious actors.</p>
<p>We do what we do because people with malicious and criminal intent are compromising and abusing millions of computers around the globe. These people do not act in ways that are moral, ethical, or legal. But in trying to counter them, we cannot allow ourselves to similarly disregard our moral, ethical, or legal obligations. If we do, we become no different than them.</p>
<p>We believe that pushing the boundaries in the computer security field and engaging in cutting edge research brings with it a responsibility to act in an ethical manner. Risks may emerge from botnet takedowns and the Kelihos botnet takedown operation is no different. What are the benefits? What are the risks? How do they balance each other? Do our actions jeopardize legal investigations? These are all questions that need to be considered and the outcome will determine how to proceed. In the situation of the Kelihos botnet, the determination was to proceed with the botnet takedown (see below for a detailed assessment.) In other situations, the determination and plan of action may be different. In the instance of Zeus, for instance, legal action may be necessary.</p>
<p>The Honeynet Project is committed to conducting research in a model, ethical, and legal way. Weighing risk/benefits – an important aspect to conduct research in such a way - is what every researcher implicitly does. However, the risk of not considering all aspects of the research exists. As a result, the Honeynet Project, under the leadership of our Chief Ethics and Legal Officer Dave Dittrich, has developed a code of conduct that guides researchers through the process in a systematic manner.</p>
<p>Today, we are publishing a <a href="https://honeynet.org/codeofconduct">draft of this code of conduct</a>. We hope you find the code of conduct useful and are looking forward to your thoughts and comments.</p>
<p><a href="http://honeynet.org/node/834" target="_blank">read more</a></p>code of conductethicsKelihosKelihos.B/Hlux.BSat, 31 Mar 2012 21:08:25 +0000christian.seifert834 at http://honeynet.org